{"id":1480,"date":"2019-11-08T11:19:42","date_gmt":"2019-11-08T11:19:42","guid":{"rendered":"https:\/\/www.securityinshredding.com\/blog\/?p=1480"},"modified":"2019-11-19T10:52:19","modified_gmt":"2019-11-19T10:52:19","slug":"cyber-security-what-can-you-do","status":"publish","type":"post","link":"https:\/\/www.securityinshredding.com\/blog\/cyber-security-what-can-you-do\/","title":{"rendered":"Cyber Security \u2013 What can you do?"},"content":{"rendered":"\n<p>As important as ensuring your physical data is kept secure through a paper shredding service, digital data security needs to be managed. Everything in today\u2019s world is online from business to leisure. Most of our days are spent connected to some network or another, in front of one screen or another. Data is our most valuable resource. For a business data is customer information which needs to be protected. Why would anyone choose to frequent a business or establishment that has zero ability to keep their information safe and secure? There are a number of things that can be done in order to ensure that this is achieved. Some may seem obvious and simple but may be the difference between success and failure. <\/p>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"1024\" height=\"655\" src=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Cyber-Security-1-1024x655.png\" alt=\"\" data-id=\"1482\" data-link=\"https:\/\/www.securityinshredding.com\/blog\/?attachment_id=1482\" class=\"wp-image-1482\" srcset=\"https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Cyber-Security-1-1024x655.png 1024w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Cyber-Security-1-300x192.png 300w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Cyber-Security-1-768x491.png 768w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Cyber-Security-1-469x300.png 469w, https:\/\/www.securityinshredding.com\/blog\/wp-content\/uploads\/2019\/11\/Cyber-Security-1.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul><\/figure>\n\n\n\n<h2>1.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\nFirewall &amp; Virus Protection<\/h2>\n\n\n\n<p>Always have a strong firewall and virus protection on your\ncomputers and devices that connect to the internet. A hacker is a person who\nuses computing devices to gain unauthorised access to data. If a hacker breaks\nthrough any defences you have, they not only will have access to what you do or\nsay online but also to every file on your PC and every keystroke you make. <\/p>\n\n\n\n<h2>2.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\nStrong Passwords<\/h2>\n\n\n\n<p>Passwords should not be obvious and the best passwords are\nrandom letters and symbols. They shouldn\u2019t be written down anywhere. It is also\nrecommended to use a different password for every account or device you use.\nHowever, remembering all these random letters and symbols can be impossible for\nmost people, password managers are useful in this situation. They pose their\nown risks too however. <\/p>\n\n\n\n<h2>3.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\nAvoid Public Wi-Fi<\/h2>\n\n\n\n<p>If at all possible do not use public Wi-Fi. It is not secure enough. When out and about its best to have Wi-Fi switched off on your phone, some phones scan for Wi-Fi networks even when it seems to be switched off so make sure your settings are all correct. However, bringing your laptop to Starbucks and conducting business can be comfortable and convenient on the go. If you really must use public Wi-Fi try to find <a rel=\"noreferrer noopener\" aria-label=\"a good VPN (opens in a new tab)\" href=\"https:\/\/www.techradar.com\/vpn\/best-vpn\" target=\"_blank\">a good VPN<\/a>. A VPN will allow you to send and receive data across shared or public networks as if you are directly connected to your private network. <\/p>\n\n\n\n<h2>4.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\nShare less on Social Media<\/h2>\n\n\n\n<p>Sharing personal information on social media is a sometimes\noverlooked method of staying secure. While you may not post things such as your\nhome address or personal email address, depending on your settings you may be\nrevealing all of this information without even realising. Check your settings\non whatever platform you use and make sure all your privacy settings are up to\nthe standard you require. <\/p>\n\n\n\n<h2>5.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;\nHard-Drive and Media Destruction<\/h2>\n\n\n\n<p>Even when you have deleted a file or an app on your phone or PC that information still exists. Hard drives are recoverable even when they have been completely wiped. When you are destroying data devices formatting them just won\u2019t cut it. Old and unused data devices should be destroyed through a hard-drive shredding service. Security in Shredding provide a nationwide Hard-Drive shredding service. This will cover the destruction of most media devices; phones, hard-drives, USB sticks, CD\u2019s, floppy discs etc. Just throwing these out as they are will make you vulnerable. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>As important as ensuring your physical data is kept secure through a paper shredding service, digital data security needs to be managed. Everything in today\u2019s world is online from business to leisure. Most of our days are spent connected to &hellip; <a href=\"https:\/\/www.securityinshredding.com\/blog\/cyber-security-what-can-you-do\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7,8,71,6,109],"tags":[],"_links":{"self":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/1480"}],"collection":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/comments?post=1480"}],"version-history":[{"count":4,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/1480\/revisions"}],"predecessor-version":[{"id":1517,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/posts\/1480\/revisions\/1517"}],"wp:attachment":[{"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/media?parent=1480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/categories?post=1480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.securityinshredding.com\/blog\/wp-json\/wp\/v2\/tags?post=1480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}